Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
ea89d5d2ad6ec58024d9e5ac762c4547_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea89d5d2ad6ec58024d9e5ac762c4547_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea89d5d2ad6ec58024d9e5ac762c4547_JaffaCakes118.dll
-
Size
443KB
-
MD5
ea89d5d2ad6ec58024d9e5ac762c4547
-
SHA1
afb68e052c5944e5c44606896dfd37aa27a82aac
-
SHA256
b51d69cb682443bd2dc040dd0bfab886d0ff3a8c459ddc73d16d03ed15ba95b8
-
SHA512
47d8dfd7f8c793e6eff272afd1353632d74ea2a48c7a001fbd36024ca132add8306711663b60a0c2993c9240bc16dc955ad0922b8bbd12ce87c6e6dd8fbc0ee2
-
SSDEEP
12288:4eEMe0SJE/a2bog8N0ctypBiAM6KExQEEqc:bS+a2W7gp26dTc
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\{695412374857FC6698B9CE2FD1341837}\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\763A.tmp" rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4704 regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2604 1932 rundll32.exe 82 PID 1932 wrote to memory of 2604 1932 rundll32.exe 82 PID 1932 wrote to memory of 2604 1932 rundll32.exe 82 PID 2604 wrote to memory of 4704 2604 rundll32.exe 85 PID 2604 wrote to memory of 4704 2604 rundll32.exe 85 PID 2604 wrote to memory of 4704 2604 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea89d5d2ad6ec58024d9e5ac762c4547_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea89d5d2ad6ec58024d9e5ac762c4547_JaffaCakes118.dll,#12⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6E69.tmp3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
363KB
MD5588518cca0fa353ebf9555cf8773d214
SHA1e8d7463dffd56f5b47b052d6d58e63fd2f990584
SHA25687fa9a5e94e4d6405cd64b79a56e4662bac5c348dbdd9e4c762da15a94f6cce3
SHA512e407301b32f122d9935ca63dad7da53ed66890436a05d3200c3a9a2e7f63be595f4c2238d839687641fb056e8a031e98eb0b9136641e07138fbda67dc6c477f5